Entries by Casey Corcoran

Key risk indicators (KRIs) are used to measure future adverse impacts of events and activities. They are widely used in areas such as healthcare, operations, and disaster risk management. KRIs use existing system and security sensor data to calculate residual risk due to IT operations. The inputs are similar to a combination of SIEM, GRC, and […]

I’m pleased to be writing this post as a member of OPAQ Networks, following the announcement today that FourV Systems has become part of the OPAQ family. Our two companies share a common focus — empowering MSPs and MSSPs with security automation to help them gain greater visibility and control while substantially simplifying the management […]

Many Managed Security Services Providers (MSSPs) provide risk dashboards to their clients. Not only do these dashboards provide an overview of enterprise IT risk, they should (in theory) enable conversations around what actions need to be taken with respect to risk exposure, as well as requests for services from the MSSP or increased budgets. Regular […]

As a Managed Security Service Provider (MSSP) accomplishing things is great, but you need to have a solid design and plan in place before achieving them — otherwise, you will start hammering away at things that are very definitely not nails. In a recent blog, we talked about using the maturity of the organization’s architecture […]

When you have to respond quickly to organizational or compliance directives from clients, in addition to the cyber security threats and risks that your organization faces every day, it can be difficult to gauge how effective you are in doing so. When configured correctly, both security information and event management (SIEM) solutions and the open […]

Companies that have spent significant resources and money on managing their cyber security environment understandably want to know the results of all this expenditure. As such, it is important for Managed Security Service Providers (MSSPs) to be able to provide customers with some visibility into those results. However, results only tell you half the story. […]

The challenges that IT security teams face can often be condensed into two critical questions: how can I grapple with the security data that we generate, and how can our tools rapidly adapt to our changing business needs? In search of answers to these questions, more and more organizations are turning to data intelligence solutions […]

No one wants to be caught off guard by a cyber attack. But simply buying and deploying the latest cyber security products and services is no guarantee of success. Minimizing the risk of a breach requires you to periodically assess the effectiveness of your security program so that you know your organization remains sufficiently protected. […]

Few subjects change as fast as cyber security; being in this field is a great way to keep on your toes. With an ever-evolving IT landscape and a constant barrage of new threats, it should hardly come as a surprise that the cyber security best practices and procedures of today look very different than those […]

“Land and expand” (L&E) is a business strategy in which customers usually sign up at one of multiple potential entry levels and then purchase additional products and/or services later on. Once you have your foot in the door, it becomes much easier for you to cross-sell and upsell than if you push a higher-end solution […]